Sciweavers

2517 search results - page 107 / 504
» Secure Deployment of Components
Sort
View
ICICS
2001
Springer
15 years 8 months ago
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
134
Voted
SIGCOMM
1997
ACM
15 years 7 months ago
Iolus: A Framework for Scalable Secure Multicasting
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...
Suvo Mittra
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 3 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
142
Voted
ESORICS
2004
Springer
15 years 9 months ago
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor dep...
Seyit Ahmet Çamtepe, Bülent Yener
ICSE
2009
IEEE-ACM
15 years 10 months ago
RAIDE for engineering architecture-based self-adaptive systems
Rainbow is an approach for engineering selfadaptive systems, with run-time, closed-loop control over target systems to monitor, detect, decide, and act on opportunities for system...
Shang-Wen Cheng, David Garlan, Bradley R. Schmerl